- cross-posted to:
- mildlyinfuriating@lemmy.world
- cross-posted to:
- mildlyinfuriating@lemmy.world
One way this happened to me was because the ” choose password” page silently truncated too long passwords. The login page didn’t truncate.
That’s been the most frustrating thing about using a password manager. I set the random generator pretty high and have to reset and decrease it randomly until the login works.
That means they’ve updated their password requirements and your new one is now rejected, or they reject passwords of a certain age or with a lack of account activity.
I’m pretty sure it was because the password was compromised. That’s what I’ve heard for a decade now.
They better not know whether the old password matches their new password requirements, as all they should have is the salted hash of the password, which reveals no information about the password on its own.
Well, that’s best practices but that’s definitely not always implemented lmao
I hate poorly made security/identity systems in general, but by far the worst is poorly made 2FA.
No, I’m not giving you my number; and if using your site requires it, I’m probably giving up using your site. Ask my email and I’ll provide my burner account.
That’s because you’ve been rate limited trying passwords for an hour. When an attacker is randomly trying incorrect passwords, even the correct password will be rejected. Otherwise the protection wouldn’t be very useful.
But then there would be no harm in just stating the rate limit :(
Relevant Tom Carty
Also, Relevant CalebCity
And why keep hashes (I fucking hope so) of old passwords?
To be able to display this error message and force you to use a different password, that way you won’t remember it.
I’ve always thought that the best password security possible would be to always have the real password fail a few times. People who know their password will keep trying it, someone else will try a different one. It’s a variation of not giving an error that tells what failed.
I used to spoof the login page of my campus freenet, fail the first login, store the password and then jump to the actual page. End of the day I just go around the lab harvesting.
To what end? What benefit was there in having people’s campus logins?
Can’t imagine. Give me your bank login credentials and I’ll let you know.
This is delightfully evil
They keep multiple old passwords. You’ve done this whole stick before and you tried to use that same password last time. You use it for everything, and every time your new account gets “hacked.” You keep using that password even when we show you that it’s been in multiple leeks and is associated with your email.
“But I like the password, it’s my favourite football team!”
Not so fun, fun fact. Google does not let you re-use the last 100 passwords.
Bruh I never wanted to log in just to use your system. Just let me use “password”.
Your hatred is steaming beans?
My hatred usually corns beef.
I’m more pissed that they are keeping all my old passwords… So when they get leaked, they all get leaked. Meanwhile, all our phones have cameras but we can’t have them take a pic on the wrong pin entered because why? No logic in Emailing the picture to you. That’s just silly.
In theory they could be only storing the hash and using that to determine if you reused an old one
This is what’s happening, if they’re even a little bit good at their jobs.